cyberbullying research center   "Someone sent me numerous emails with like two words in the email like 'your gay' 'your dumb' and that kind of stuff. When I am bullied (which is infrequently) I am called homosexual or gay so I'm used to it but it still hurts." (14 year-old boy from Canada)
...identifying the causes and consequences of cyberbullying
Navigation Menu
Check out our books!
Dealing with Cyberbullying
1.
Which of the following can be considered "cyberbullying"?
A. Sending harassing text messages
B. Creating mean web sites
C. Posting embarrassing pictures of someone else online without their permission
D. Threatening someone on Facebook
E. All of the above

2.
A person can do the following when he or she is being bullied online:
A. Sign off from or leave the chatroom or instant message conversation
B. Block the bully's messages
C. Ignore the bully
D. Tell an adult
E. All of the above

3.
How can you find out if there is any personal information about you on the Internet?
A. Ask a stranger
B. Ask your parents
C. Google yourself
D. Call the police
E. You can't find out, it is impossible

4.
You should call the police if which of the following happens to you online:
A. Someone threatens your safety
B. Someone threatens your family's safety
C. Someone tries to set up a face-to-face meeting with you
D. Someone pressures you to do something illegal
E. All of the above

5.
Which of the following is the best way to protect your personal information while online?
A. Set your MySpace and Facebook page to "private"
B. Only tell your friends your passwords
C. Don't ever put any personal information online
D. Only post private information on web sites that you trust
E. All of the above

6.
A person can do the following when he or she feels like bullying others:
A. Turn off the computer
B. Journal/write the situation down on paper
C. Call a friend for emotional support
D. All of the above
E. None of the above

7.
What are some ways that digital evidence of cyberbullying can be collected and used to get an adult to discipline the bully?
A. Instant messaging logs
B. Screenshots taken of offending web pages
C. Tracing the identity of an email sender
D. Analyzing computer hard drives and flash memory cards in phones and cameras
E. All of the above

8.
Which of the following would be the most secure password for an online site?
A. "computer"
B. "cow"
C. "$trawb3rry"
D. "5555555555"
E. "football37"

9.
What should you do if you see someone else being cyberbullied?
A. Report it to an adult
B. Support the person who is being bullied
C. Stand up to the bully
D. Save any digital evidence (make screenshots, printouts, etc.)
E. All of the above

10.
Which of the following should you do if you are cyberbullied:
A. Think that it is your fault
B. Keep it to yourself
C. Try to resolve it yourself, and then tell an adult if you are unsuccessful
D. Skip school
E. Fight back

Follow Us!

youtube twitter
Sameer's Linkedin Cyberbullying Research Center on Facebook! Justin's Linkedin

What They're Saying...
"Dr. Hinduja, your presentation on cyberbullying was awesome! Your insight and passion to protect our children were clearly transmitted. I believe it is very important to be aware, informed and close to our children in order to avoid unwanted consequences. Thanks for working towards a safer world!" Deborah Hamui, Founder of Sleep'n Sync - helping children achieve their goals.
Recent Comments

Link Buttons
Use these buttons to link to our site:

cyber bullying
cyberbullying research center
online harassment
Internet bullying